161. Applied cryptography and network security
Author: Feng Bao, Pierangela Samarati, Jianying Zhou (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
A26
2012eb


162. Applied cryptography and network security :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Data encryption (Computer science) ; Congresses. ;

163. Applied cryptography and network security
Author: / Markus Jakobsson , Moti Yung , Jianying Zhou (eds.)
Library: Library of Campus2 Colleges of Engineering of Tehran University (Tehran)
Subject: Telecommunication -- Security measures -- congresses,Data encription (Computer science),Criptography -- congresses
Classification :
TK
5102
.
94
.
A28
2004


164. Applied cryptography and network security
Author: / Jianying Zhou, Moti Yung (eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Data encryption (Computer science), Congresses,Computer networks, Security measures, Congresses,Computer networks, Access control, Congresses
Classification :
QA76
.
9
.
A25A26
2010


165. Applied cryptography and network security :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Data encryption (Computer science) ; Congresses. ;

166. Applied cryptography and network security : Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004 : proceedings
Author: Markus Jakobsson, Moti Yung, Jianying Zhou )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Telecommunication -- Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
3089


167. Applied cryptography and network security : Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings
Author: John Ioannidis, Angelos Keromytis, Moti Yung )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Telecommunication -- Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
3531


168. Applied cryptography and network security : first International Conference, ACNS 2003, Kunming, China, October 16-19, 2003 : proceedings
Author: Jianying Zhou, Moti Yung, Yongfei Han, )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Telecommunication -- Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
2846


169. Applied cryptography and network security: 6th international conference, ACNS 2008, New York, NY, USA, June 3-6, 2008 : proceedings
Author: Steven M. Bellovin ... ]et al.[ )eds.(
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Congresses ، Telecommunication - Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography
Classification :
TK
5102
.
94
.
A28


170. Applied cryptography and network security : third international conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings
Author: John Ioannidis, Angelos Keromytis, Moti Yung )eds.(
Library: Library of College of Science University of Tehran (Tehran)
Subject: Congresses ، Telecommunication -- Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography
Classification :
TK
5102
.
85
.
A26
2005


171. Applied cryptography and network security: third international conference, ACNS 2005, New York, NY, USA, june 7-10 , 2005: proceddings
Author: John Ioannidis, angelos keromytis, moti Yung (eds)
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Telecommunciations -- Security measures -- congresses,Data encryption (computer science) -- congresses,Cryptography -- Congresses
Classification :
TK
،
5102
.
85
،.
A26
،
2005


172. Applied cryptography and network security workshops :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Data encryption (Computer science) ; Congresses. ;

173. Applied cryptography and network security workshops :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Data encryption (Computer science) ; Congresses. ;

174. Applied cryptography and network security workshops :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Data encryption (Computer science) ; Congresses. ;

175. Applied cryptography : protocols, algorithms, and source code in C
پدیدآورنده : Schneier, Bruce
موضوع : ، Computer security,، Telecommunication-- Security measures,، Cryptography
۲ نسخه از این کتاب در ۱ کتابخانه موجود است.
176. Applied cryptography : protocols, algorithms, and source code in C
Author: Schneier, Bruce
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Computer security, Telecommunication - Security measures, Cryptography
Classification :
QA
76
.
9
.
A25
S35
1996


177. Applied cryptography: protocols, algorithms, and source code in C
Author: Schneier, Bruce
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Computer security,Security measures ، Telecommunication,، Cryptography
Classification :
QA
76
.
9
.
A25
S35
1996


178. Applied cryptography: protocols, algorithms, and source code in C [electronic resource]
Author: / Bruce Schneier
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: Computer security,Telecommunication--Security measures,Cryptography
Classification :
EB
,
QA76
.
9
.
A25
,
S35
1996

179. Applied cryptography :protocols, algorithms, and source code in C ruce Schneier
Author: Schneier, Bruce
Library: Central Library and Documentation Center (Semnan)
Subject: ، Computer security,، Telecommunicatio--Security measures,، Cryptography
Classification :
QA
76
.
9
.
A25S35
1996


180. Applied cryptology, cryptographic protocols, and computer security models
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: Access control ، Computers,، Cryptography
Classification :
QA
76
.
9
.
A25
.
A66
1983

